Browse Results

Showing 27,851 through 27,875 of 59,613 results

Improving Classroom Learning with ICT (Improving Learning)

by Rosamund Sutherland Susan Robertson Peter John

Improving Classroom Learning with ICT examines the ways in which ICT can be used in the classroom to enhance teaching and learning in different settings and across different subjects. Weaving together evidence of teachers’ and learners’ experiences of ICT, the authors: explain why the process of integrating ICT is not straightforward; discuss whether hardware and infrastructure alone are sufficient to ensure full integration and exploitation of ICT investment; emphasise the pivotal role that teachers play in supporting learning with ICT across the curriculum; argue that teachers need a greater understanding of how to put ICT to use in teaching and learning; highlight that out-of-school use of ICT has an impact on in-school learning; consider what kinds of professional development are most effective in supporting teachers to use technologies creatively and productively. Case studies are used to illustrate key issues and to elaborate a range of theoretical ideas that can be used in the classroom. This book will be of interest to all those concerned with maximising the benefits of ICT in the classroom.

Improving Consistency in Performance Measurement System Design: The Case of the Colombian Public Schools (System Dynamics for Performance Management & Governance #7)

by Robinson Salazar Rua

This book analyzes behavioral distortions in public schools and delineates outcome-based performance measurement systems that can prevent and mitigate them. An instrumental view of dynamic performance management (DPM) is used to support the endeavor by identifying how performance drivers affect end results of outcome and output, how end results affect strategic resources, and how strategic resources and benchmarks define the dynamics of performance drivers. This approach is also used to promote a shift from an output-oriented to an outcome-oriented view in performance management, with the aim of achieving sustainable results in the long term. The book also includes a comprehensive literature review at the end of each chapter, intended to strengthen readers’ knowledge and encourage further research. Given its scope, the book will appeal to graduate students in public management, researchers in performance management, system dynamics, and education, and decision-makers in public schools.

Improving Decision Making Using Semantic Web Technologies

by Tek Raj Chhetri

As technology becomes integral to our lives, its influence on decision making in smart cities, healthcare, and manufacturing is undeniable. However, challenges such as limited contextual awareness, domain knowledge, explainability of machine learning (ML), and issues of interoperability, data quality, and GDPR (General Data Protection Regulation) compliance in data sharing hinder effective decision making. This book addresses these critical challenges by exploring how the synergy of semantic technologies (SW), like ontologies and knowledge graphs, with or without ML, can overcome these challenges to improve decision making. Through real-world case studies in data sharing, manufacturing, and agriculture, it offers theoretical and practical insights and guidelines of how SW can enhance prediction accuracy, integrate domain knowledge, support ML explainability, and tackle interoperability, data quality, and GDPR challenges.

Improving Disaster Management: The Role Of It In Mitigation, Preparedness, Response, And Recovery

by National Research Council of the National Academies

Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this area, the Congress, in the E-government Act of 2002, directed the Federal Emergency Management Agency (FEMA) to request the NRC to conduct a study on the application of IT to disaster management. This report characterizes disaster management providing a framework for considering the range and nature of information and communication needs; presents a vision of the potential for IT to improve disaster management; provides an analysis of structural, organizational, and other non-technical barriers to the acquisition, adoption, and effective use of IT in disaster; and offers an outline of a research program aimed at strengthening IT-enabled capabilities for disaster management.

Improving Forecasts with Integrated Business Planning: From Short-Term to Long-Term Demand Planning Enabled by SAP IBP (Management for Professionals)

by Ganesh Sankaran Federico Sasso Robert Kepczynski Alessandro Chiaraviglio

This book provides both a broad overview of the forecasting process, covering technological and human aspects alike, and deep insights into algorithms and platform functionalities in the IBP toolbox required to maximize forecast accuracy. Rich in technical and business explanations, it addresses short-, medium- and long-term forecasting processes using functionalities available in demand planning and demand sensing. There are also several theoretical concepts underpinning the algorithms discussed; these are explained with numerical examples to help demystify the IBP forecasting toolbox. Beyond standard procedures, the book also discusses custom approaches (e.g. new segmentation criteria, new outlier detection and correction methods) and new methods (e.g. the use of Markov chains for forecasting sporadic demands), etc. It subsequently benchmarks common practices using these innovative approaches and discusses the results. As measurement is an important precondition for improvement, an entire chapter is devoted to discussing process improvement and value using the Six Sigma methodology. In closing, the book provides several useful tips and tricks that should come in handy during project implementation.

Improving Human Performance in Dynamic Tasks: Applications in Management and Industry (SpringerBriefs in Complexity)

by Hassan Qudrat-Ullah

This book is about improving human decision making and performance in complex, dynamic tasks. The defining characteristics of a dynamic decision task are that there are a number of decisions required, that decisions are interdependent and that the environment in which the decision is made is transient and feedback is pervasive. Examples of dynamic tasks include the sustainable management of renewable resources and how businesses might allocate resources for research and development (R&D) projects. Decision making in dynamic tasks can be improved through training with system dynamics–based interactive learning environments (ILE’s) that include systematic debriefing. Some key features of the book include its didactic approach, numerous tables, figures, and the multidimensional evaluative model. Researchers can use the developed “evaluation model” to gauge various decision-aiding technologies. How to Improve Human Performance in Dynamic Tasks appeals to those interested in the design and evaluation of simulation-based decision support systems, as well as policy makers, students, researchers, and industrialists concerned by the issue of improving human performance in organizational tasks.

Improving Image Quality in Visual Cryptography (Signals and Communication Technology)

by Bin Yan Yong Xiang Guang Hua

This book comprehensively covers the important efforts in improving the quality of images in visual cryptography (VC), with a focus on cases with gray scale images. It not only covers schemes in traditional VC and extended VC for binary secret images, but also the latest development in the analysis-by-synthesis approach. This book distinguishes itself from the existing literature in three ways. First, it not only reviews traditional VC for binary secret images, but also covers recent efforts in improving visual quality for gray scale secret images. Second, not only traditional quality measures are reviewed, but also measures that were not used for measuring perceptual quality of decrypted secret images, such as Radially Averaged Power Spectrum Density (RAPSD) and residual variance, are employed for evaluating and guiding the design of VC algorithms. Third, unlike most VC books following a mathematical formal style, this book tries to make a balance between engineering intuition and mathematical reasoning. All the targeted problems and corresponding solutions are fully motivated by practical applications and evaluated by experimental tests, while important security issues are presented as mathematical proof. Furthermore, important algorithms are summarized as pseudocodes, thus enabling the readers to reproduce the results in the book. Therefore, this book serves as a tutorial for readers with an engineering background as well as for experts in related areas to understand the basics and research frontiers in visual cryptography.

Improving Internet Reference Services to Distance Learners

by William Miller Rita Pellen

In their efforts to provide distance learners with the most effective services possible, librarians and information specialists are working more and more with faculty in academic departments, IT departments, and other librarians at cooperating institutions. Improving Internet Reference Services to Distance Learners chronicles how those efforts have seen librarians become actively involved in online course management and delivery systems, particularly Blackboard, Desire2Learn, and WebCT, or by "embedding" themselves into the online course structure to better learn where students need assistance. This invaluable resource also examines how librarians use Internet resources to support professional and continuing education and to establish university-wide information and referral services to provide quality service to distance learners.Improving Internet Reference Services to Distance Learners encourages librarians to think more broadly about working with "outside" individuals when designing and providing reference and other services to nontraditional users. The book examines why it&’s best to consider user needs, funding, staff management, and collaboration development when planning Internet reference services, how to develop and implement a required, credit-bearing online information literacy course, and how to apply effective marketing techniques from the business world to increase awareness of reference support services available to distance learners. It also offers a look at the Walden University Library at Indiana University-Bloomington, which "houses" no print collection-only online databases-and includes case studies that document the design and development of Internet reference services for the University of Illinois&’ Fire Service Institute, and the efforts to provide support for doctor of pharmacy students at the University of Wisconsin-Madison in their final year of study. Improving Internet Reference Services to Distance Learners provides practical information on: monitoring online discussion threads devoted to library research Web-based interactive tutorials integrating library services in support of coursework integrating library services into online courses offering, promoting, and providing instruction to public users, as well as local and distance students developing a web site that centralizes information about library services and resources the potential of the academic library to be the central provider of information and referral services for an entire universityImproving Internet Reference Services to Distance Learners is an invaluable resource for librarians working in academic, school, special, and public settings, and for library science faculty and students.

Improving Learning with Information Technology: Report of a Workshop

by National Research Council

In spring 2000, representatives from the U. S. Department of Education (DOEd) and senior staff at the National Research Council (NRC) recognized a common frustration: that the potential of information technology to transform K-12 education remains unrealized. In fall 2000 the U. S. DOEd formally requested that the National Academies undertake an interdisciplinary project called Improving Learning with Information Technology (ILIT). The project was launched with a symposium on January 24-25, 2001. This report summarizes the proceedings of the symposium and is intended for people interested in considering better strategies for using information technology in the educational arena. While it offers insights from the presenters on both the challenges to and the opportunities for forging a better dialogue among learning scientists, technologists, and educators, it does not contain conclusions or recommendations. Rather, it highlights issues to consider, constituents to engage, and strategies to employ in the effort to build a coalition to harness the power of information technologies for the improvement of American education. Every effort has been made to convey the speakers' content and viewpoints accurately. Recognizing the speculative nature of many of the speaker contributions, most attributions identify a speaker by area of expertise rather than by name. The report reflects the proceedings of the workshop and is not intended to be a comprehensive review of all the issues involved in the project to improve learning with information technology.

Improving Learning with Information Technology: Report of a Workshop

by Steering Committee on Improving Learning Information Technology

A report on Improving Learning with Information Technology

Improving Operating Leverage Using Hyperautomation: Unlock Strategic Advantages Across Banking and Non-Banking Financial Institutions

by Kannan Subramanian R

Improving operating leverage is about operational resilience, structural operational efficiency, and sustainable revenue growth. Activity-based enterprise non-interest cost management is an important component of enterprise risk adjusted return management methodology. This book builds on the author Kannan Subramanian’s earlier book, Event- and Data-Centric Enterprise Risk-Adjusted Return Management, delving in depth into enterprise non-interest operating cost management and operating leverage. Operating Leverage is about managing a bank’s capabilities and its capacity to deliver its products and services efficiently. It is not limited to managing operational costs but includes the operational support for the growth of business and for improving profitability. Profit is an absolute measure that denotes the amount of money the bank makes after deducting all expenses. Profitability measures how efficient the bank is at utilizing its resources to generate risk-adjusted returns. The reader can learn to improve risk adjusted operational effectiveness by implementing a nuanced approach to managing performance, risk, control, and cost simultaneously, at the process level. You’ll examine how some institutions have implemented activity-based costing in a siloed environment and without enterprise process automation. Many institutions do not have a scientific way of managing non-interest costs. The book explains why hyperautomation, a technology that intelligently automates business processes, is a more advanced and comprehensive way to manage these factors in a holistic and integrated way. Improving Operating Leverage using Hyperautomation is your complete guide to enhancing risk adjusted operational performance through a nuanced approach to performance, risk, control, and costs at the process level. What You Will Learn Define and use the bill of resources to improve operating leverage. Implement activity-based enterprise non-interest cost management using hyperautomation Monitor performance, risk, control, and cost at the process level. Implement time-driven activity-based costing for an enterprise risk-adjusted return model. Who This Book Is For Most banking industry professionals, including senior management teams, consultants, central bankers, financial regulators, software vendors, and Business Process Management Suite/Hyperautomation technology vendors.

Improving Service Level Engineering

by Roland Schütze

This book examines how fuzzy methods can be employed to manage service levels in business and IT alignment. It starts by mapping the dependencies of service level agreements, coming up with gradual and bi-polar concepts to eventually classify the level of coupling by intuitionistic fuzzy sets. The second part presents an approach to analyze the impact of service failures using intuitionistic fuzzy methods (IFSFIA). Lastly, the third part of the book extends the concept towards business and IT-aligned service-level engineering and provides two use cases.

Improving Software Testing: Technical and Organizational Developments

by Tim A. Majchrzak

Software is continuously increasing in complexity. Paradigmatic shifts and new development frameworks make it easier to implement software - but not to test it. Software testing remains to be a topic with many open questions with regard to both technical low-level aspects and to the organizational embedding of testing. However, a desired level of software quality cannot be achieved by either choosing a technical procedure or by optimizing testing processes. In fact, it requires a holistic approach.This Brief summarizes the current knowledge of software testing and introduces three current research approaches. The base of knowledge is presented comprehensively in scope but concise in length; thereby the volume can be used as a reference. Research is highlighted from different points of view. Firstly, progress on developing a tool for automated test case generation (TCG) based on a program's structure is introduced. Secondly, results from a project with industry partners on testing best practices are highlighted. Thirdly, embedding testing into e-assessment of programming exercises is described.

Improving Soil Fertility Recommendations in Africa using the Decision Support System for Agrotechnology Transfer (DSSAT)

by Andre Bationo Gerrit Hoogenboom Job Kihara Ramadjita Tabo Dougbedji Fatondji James W Jones

The book gives a detailed description of the application of DSSAT in simulating crop and soil processes within various Agro-ecological zones in Africa. The book, an output of a series of 3 workshops, provides examples of the application of DSSAT models to simulate nitrogen applications, soil and water conservation practices including effects of zai technology, phosphorus and maize productivity, generation of genetic coefficients, long-term soil fertility management technologies in the drylands, microdosing, optimization of nitrogen x germplasms x water, spatial analysis of water and nutrient use efficiencies and, tradeoff analysis. The minimum dataset requirements for DSSAT is discussed. This book arises from attempts to address the limited use of models in decision support by African agricultural (both soil scientist and agronomists) scientists.

Improving Technology Through Ethics (SpringerBriefs in Applied Sciences and Technology)

by Simona Chiodo David Kaiser Julie Shah Paolo Volonté

This book deals with the ethics of technology and addresses specific ethical problems related to some emerging technologies, mainly in the field of computer science (from machine learning models to extracting value from data to human–robot interaction). The contributions are authored mainly by scholars in ICT and other engineering fields who reflect on ethical and societal issues emerging from their own research activity. Thus, rather uniquely, the work overcomes the traditional divide between pure ethical theory that disregards what practitioners do and mere R&D practice that ignores what theorists conceptualize. Conversely, the reader is enabled to understand what ethics means when it is actually put into work by engineering researchers. The book arises from a joint program between MIT and Politecnico di Milano aimed at training early career researchers in addressing the ethical issues of technology and critically reflecting on the social impacts of the emerging, and even disruptive, technologies they are currently developing through their novel research. Overall, it aims at spreading the task of developing technologies that, from the beginning, are designed to be responsible for human life, society, and nature.

Improving the Air Force Scientific Discovery Mission: A Workshop Report

by Committee on Improving the Air Force Scientific Discovery Mission: Leveraging Best Practices in Basic Research Management: A Workshop

In 2015, the Air Force Studies Board conducted a workshop, consisting of two data-gathering sessions, to review current research practices employed by the Air Force Office of Scientific Research (AFOSR). Improving the Air Force Scientific Discovery Mission summarizes the presentations and discussions of these two sessions. This report explores the unique drivers associated with management of a 6. 1 basic research portfolio in the Department of Defense and investigates current and future practices that may further the effective and efficient management of basic research on behalf of the Air Force

Improving the Performance of Wireless LANs: A Practical Guide

by Nurul Sarkar

While there are countless books on wireless networks, few actually quantify the key performance-limiting factors of wireless local area networks (WLANs) and describe various methods for improving WLAN performance. Fulfilling these needs, Improving the Performance of Wireless LANs: A Practical Guide provides both theoretical background and empirical

Improving the Quality of ABAP Code: Striving for Perfection

by Paul David Hardy

Gain an in-depth understanding of the large number of common problems found in ABAP programs and have a robust methodology for fixing problems when you find them. This book also shows you how to prevent them from occurring in new programs.A large chunk of the world’s biggest organizations use SAP software and virtually all of them have very large amounts of custom code. However, a lot of that custom code is not as good as it could be. In this book we look at why object-oriented programming is the basic building block for improved program quality and at the test-driven development that this enables. We cover the three pillars of clarity, stability, and high performance on which a high-quality ABAP program stands. You will then move on to the user interface, which needs its own set of standards for high quality. In the final chapters, you will learn about specialist topics such as user exits, making sure code will run on the latest releases of SAP, and how to add your own automated custom code quality checks. What You Will Learn Know why object-oriented programming and test-driven development are the cornerstones of high-quality custom code Ensure that the three pillars of clarity, stability, and high performance are fulfilled Make sure your applications are user friendlyEnsure that your custom code works on newer SAP releasesCreate your own custom code quality checks Who This Book Is ForABAP developers who started yesterday or have been programming for 20 years

Improving the Test Process

by Erik Van Veenendaal Graham Bath

This book covers the syllabus for the Improving the Test Process module of the International Software Testing Qualifications Board (ISTQB) Expert Level exam. To obtain certification as a professional tester at the Expert Level, candidates may choose to take a course given by an ISTQB accredited training provider and then sit for the exam. Experience shows that many candidates who choose this path still require a reference book that covers the course. There are also many IT professionals who choose self-study as the most appropriate route toward certification. This book can be used both as a preparation guide for those planning to take the ISTQB Expert Level certification exam and as a practical guide for experienced testing professionals who want to develop their skills in improving test processes.

Improving Web Application Security: Threats and Countermeasures

by Microsoft Corporation

Gain a solid foundation for designing, building, and configuring security-enhanced, hack-resistant Microsoft® ASP.NET Web applications. This expert guide describes a systematic, task-based approach to security that can be applied to both new and existing applications. It addresses security considerations at the network, host, and application layers for each physical tier--Web server, remote application server, and database server--detailing the security configurations and countermeasures that can help mitigate risks. The information is organized into sections that correspond to both the product life cycle and the roles involved, making it easy for architects, designers, and developers to find the answers they need. All PATTERNS & PRACTICES guides are reviewed and approved by Microsoft engineering teams, consultants, partners, and customers--delivering accurate, real-world information that's been technically validated and tested.

Improving your C# Skills: Solve modern challenges with functional programming and test-driven techniques of C#

by Ovais Mehboob Ahmed Khan John Callaway Clayton Hunt Rod Stephens

Conquer complex and interesting programming challenges by building robust and concurrent applications with caches, cryptography, and parallel programming.Key FeaturesUnderstand how to use .NET frameworks like the Task Parallel Library (TPL)and CryptoAPIDevelop a containerized application based on microservices architectureGain insights into memory management techniques in .NET CoreBook DescriptionThis Learning Path shows you how to create high performing applications and solve programming challenges using a wide range of C# features. You’ll begin by learning how to identify the bottlenecks in writing programs, highlight common performance pitfalls, and apply strategies to detect and resolve these issues early. You'll also study the importance of micro-services architecture for building fast applications and implementing resiliency and security in .NET Core. Then, you'll study the importance of defining and testing boundaries, abstracting away third-party code, and working with different types of test double, such as spies, mocks, and fakes. In addition to describing programming trade-offs, this Learning Path will also help you build a useful toolkit of techniques, including value caching, statistical analysis, and geometric algorithms. This Learning Path includes content from the following Packt products:C# 7 and .NET Core 2.0 High Performance by Ovais Mehboob Ahmed KhanPractical Test-Driven Development using C# 7 by John Callaway, Clayton HuntThe Modern C# Challenge by Rod StephensWhat you will learnMeasure application performance using BenchmarkDotNetLeverage the Task Parallel Library (TPL) and Parallel Language Integrated Query (PLINQ)library to perform asynchronous operationsModify a legacy application to make it testableUse LINQ and PLINQ to search directories for files matching patternsFind areas of polygons using geometric operationsRandomize arrays and lists with extension methodsUse cryptographic techniques to encrypt and decrypt strings and filesWho this book is forIf you want to improve the speed of your code and optimize the performance of your applications, or are simply looking for a practical resource on test driven development, this is the ideal Learning Path for you. Some familiarity with C# and .NET will be beneficial.

Improving your Penetration Testing Skills: Strengthen your defense against web attacks with Kali Linux and Metasploit

by Gilberto Najera-Gutierrez Juned Ahmed Ansari Daniel Teixeira Abhinav Singh

Evade antiviruses and bypass firewalls with the most widely used penetration testing frameworks Key Features Gain insights into the latest antivirus evasion techniques Set up a complete pentesting environment using Metasploit and virtual machines Discover a variety of tools and techniques that can be used with Kali Linux Book Description Penetration testing or ethical hacking is a legal and foolproof way to identify vulnerabilities in your system. With thorough penetration testing, you can secure your system against the majority of threats. This Learning Path starts with an in-depth explanation of what hacking and penetration testing is. You'll gain a deep understanding of classical SQL and command injection flaws, and discover ways to exploit these flaws to secure your system. You'll also learn how to create and customize payloads to evade antivirus software and bypass an organization's defenses. Whether it's exploiting server vulnerabilities and attacking client systems, or compromising mobile phones and installing backdoors, this Learning Path will guide you through all this and more to improve your defense against online attacks. By the end of this Learning Path, you'll have the knowledge and skills you need to invade a system and identify all its vulnerabilities. This Learning Path includes content from the following Packt products: Web Penetration Testing with Kali Linux - Third Edition by Juned Ahmed Ansari and Gilberto Najera-Gutierrez Metasploit Penetration Testing Cookbook - Third Edition by Abhinav Singh , Monika Agarwal, et al What you will learn Build and analyze Metasploit modules in Ruby Integrate Metasploit with other penetration testing tools Use server-side attacks to detect vulnerabilities in web servers and their applications Explore automated attacks such as fuzzing web applications Identify the difference between hacking a web application and network hacking Deploy Metasploit with the Penetration Testing Execution Standard (PTES) Use MSFvenom to generate payloads and backdoor files, and create shellcode Who this book is for This Learning Path is designed for security professionals, web programmers, and pentesters who want to learn vulnerability exploitation and make the most of the Metasploit framework. Some understanding of penetration testing and Metasploit is required, but basic system administration skills and the ability to read code are a must.

Improving Your Splunk Skills: Leverage the operational intelligence capabilities of Splunk to unlock new hidden business insights

by James D. Miller Paul R. Johnson Josh Diakun Derek Mock

Transform machine-generated data into valuable business insights using the powers of Splunk Key Features Explore the all-new machine learning toolkit in Splunk 7.x Tackle any problems related to searching and analyzing your data with Splunk Get the latest information and business insights on Splunk 7.x Book Description Splunk makes it easy for you to take control of your data and drive your business with the cutting edge of operational intelligence and business analytics. Through this Learning Path, you'll implement new services and utilize them to quickly and efficiently process machine-generated big data. You'll begin with an introduction to the new features, improvements, and offerings of Splunk 7. You'll learn to efficiently use wildcards and modify your search to make it faster. You'll learn how to enhance your applications by using XML dashboards and configuring and extending Splunk. You'll also find step-by-step demonstrations that'll walk you through building an operational intelligence application. As you progress, you'll explore data models and pivots to extend your intelligence capabilities. By the end of this Learning Path, you'll have the skills and confidence to implement various Splunk services in your projects. This Learning Path includes content from the following Packt products: Implementing Splunk 7 - Third Edition by James Miller Splunk Operational Intelligence Cookbook - Third Edition by Paul R Johnson, Josh Diakun, et al What you will learn Master the new offerings in Splunk: Splunk Cloud and the Machine Learning Toolkit Create efficient and effective searches Master the use of Splunk tables, charts, and graph enhancements Use Splunk data models and pivots with faster data model acceleration Master all aspects of Splunk XML dashboards with hands-on applications Apply ML algorithms for forecasting and anomaly detection Integrate advanced JavaScript charts and leverage Splunk's API Who this book is for This Learning Path is for data analysts, business analysts, and IT administrators who want to leverage the Splunk enterprise platform as a valuable operational intelligence tool. Existing Splunk users who want to upgrade and get up and running with Splunk 7.x will also find this book useful. Some knowledge of Splunk services will help you get the most out of this Learning Path.

Imputation Methods for Missing Hydrometeorological Data Estimation (Water Science and Technology Library #108)

by Ramesh S.V. Teegavarapu

Missing data is a ubiquitous problem that plagues many hydrometeorological datasets. Objective and robust spatial and temporal imputation methods are needed to estimate missing data and create error-free, gap-free, and chronologically continuous data. This book is a comprehensive guide and reference for basic and advanced interpolation and data-driven methods for imputing missing hydrometeorological data. The book provides detailed insights into different imputation methods, such as spatial and temporal interpolation, universal function approximation, and data mining-assisted imputation methods. It also introduces innovative spatial deterministic and stochastic methods focusing on the objective selection of control points and optimal spatial interpolation. The book also extensively covers emerging machine learning techniques that can be used in spatial and temporal interpolation schemes and error and performance measures for assessing interpolation methods and validating imputed data. The book demonstrates practical applications of these methods to real-world hydrometeorological data. It will cater to the needs of a broad spectrum of audiences, from graduate students and researchers in climatology and hydrological and earth sciences to water engineering professionals from governmental agencies and private entities involved in the processing and use of hydrometeorological and climatological data.

IMS: A New Model for Blending Applications

by Mark Wuthnow Jerry Shih Matthew Stafford

IP Multimedia Subsystem (IMS) technology, which merges the Internet with interactive telecommunications, represents the here and now for today's packet-switched networks. Consequently, anyone working with or around these converging fields needs to possess a fundamental understanding of IMS and how this technology is poised to change the way new app

Refine Search

Showing 27,851 through 27,875 of 59,613 results